robert.perry.rasmussen.assignments

Tuesday, March 16, 2010

MY COMPANY Project Management




This document will discover the team members and define their interaction with the team project. The following diagram is a visual representation of the team hexarchy and corporate ladder. This visual representation of the team is explained after the picture with descriptions of how each team member will fit into the project. The end goal of the project is to increase the security of the computer networks at MY COMPANY. This team will also recreate this process for external production in the channels of vendors and customers of MY COMPANY. The end goal is to defeat the threat of VIRUS or MALWARE by reducing the total threat at each communication point. If all of the customers and vendors of MY COMPANY were protected the same way, then there would be zero chance of external friendly fire by mistake. This increased security also prevents intentional sabotage and employee malice because of the extended features of the protection services. Process XPS shows the diagram in large detail.

The Management Team: The management team identifies the needs of the company. Security needs, software needs, and evaluates the effectiveness of the implemented decisions. They can command all of the departments lower down on the chain of command.

Software Engineering: Responsible for coordinating the right antivirus solution with the technology available. A software engineer configures the antivirus software/hardware equipment in the Data Center, configures the antivirus software/hardware in the offices, and configures the server for the right antivirus solution. This includes implementing SQL services, monitoring logs, and researching effectiveness of antivirus solutions.

Technical Design: Supports the software engineer with any technical hardware requirements to reduce the involvement of the software engineer in the routine processes. The software engineer relies on the technical designer to get each hardware device up to date and up to software requirements. The technical designer may have a team of its own to complete requests made by the software engineer. These requests could be parts ordering, tracking hardware, tracing software, implementing requests made by the engineer.

Data Center Operator: Assures the function and stability of the data center. This data center operates to distribute antivirus solutions to the organization and to the branches of the organization. Data center operators answer to the software engineer and to the technical design team. They can provide data and logs to the other teams if there are problems that cannot be resolved at a standard level.

Customer Support: Support for the direct customers, vendors, and inner organization. This is a team of 5 – 15 individuals on 24/7 monitoring support. They have access to information databases about current, past, and future threats. They are responsible for communicating their troubleshooting sessions to the quality assurance team. They log all of their daily conversations and interactions with customers for knowledge base archiving.

Quality Assurance: Makes sure that all of the previous teams and team members are functioning effectively. Also, QA is responsible for the knowledgebase. They plan for future improvements in the software by recognizing flaws and detailing the real world scenarios to the engineer.

Sales Team: The sales team ensures the spread of the security solutions throughout the organization. They ensure that all employees have this antivirus solution at the office, at home, and on the road. They also are responsible for communicating with the customers, vendors, and other branches of “MY COMPANY”.

It is my experience that custom software applications and the forms of software productions that are discussed statistically here are prone to disaster for several reasons. First and foremost software failure can be contributed to the lack of research prior to the development phase.

Developing software is not an easy task to attempt at any level. Developing custom software applications requires ongoing support prior to development in order to repair mistakes or fix bugs. Many individuals that take on the tasks involved with creating software applications are not financially capable of carrying out the maintenance after the product is published.

Secondly, software is forgotten about after it is installed on a user's computer unless the application is up front and hard to ignore. How many programs are on your computer that you have neglected for more than 30 days? You can find this out in your Add/Remove Applications in the control panel. Making an application that does not tie up the system with memory consumption is difficult to achieve. How many applications are running in your system memory that is unnecessary? Chances are there are about 5 to 7 programs running in your computer right now that you do not absolutely need.

Software developers that begin developing applications for production use often abandon the project long before it begins. This is due in part to several reasons. Mainly, checking source code for copyright infringement leads to numerous changes. Sometimes the changes to the source code will disable the program from running correctly or even running at all. After fighting a software development for months without producing an income for the efforts is the final reason why many software applications are considered runaway.
Answering the six fundamental questions that each project manager should address is not an easy process. With assistance from many different resources, support staff, and mentors any business professional can answer the following questions (six questions);

• What Business Situation is Being Addressed?
• What do you need to do?
• What will you do?
• How will you do it?
• How will you know you did it?
• How well did you do?

Every time a business professional approaches these six questions, a magnitude of variable answers is presented. Often times the answers can lead to more questions that can lead the executive professional on a path further towards confusion. On the other hand, this could become a successful project management approach if the organization has in place the right set of Process Groups.

It becomes relevant in a corporate environment to maintain a level of communications that embodies the entire organization. A structure of governing individuals forms the joints at which each branch of the organization can build. Designating structure to each branch gives objectives to the Process Group so they can complete tasks assigned. Typically there are five different process group branches available to the organization. They are;

• Scoping Process Group
• Planning Process Group
• Launching Process Group
• Monitoring and Controlling Process Group
• Closing Process Group

If the company represented here is able to answer the six questions related to the methodology, they would represent each question with a symbol. The easiest symbol to use is a circle and each one can be a different color. To earn a seal of approval, each process group must complete the six questions plus, add one additional question that would benefit the project. This is also known as earning the five stars because a project is classified as five star if it is a complete win.
An example for the +1 question would be: Does X-project contain profitability factors? +1 could also be a series of arguments relating to another Processing Group’s final outcome. Say if the Launching Process Group completed the six questions and the Monitoring/Controlling Process Group wanted to know answers relating to their answers, then the +1 question would apply at that time.

Over the past ten years “My Company” has taken many different approaches to answering the call to increase its network security. Panda Security provides coverage by way of layered security for the entire chain of office computers. “My Company” needs to break away from the individually managed antivirus software applications and move into a corporate structured antivirus solution.

With Panda Secure, a multi layered security grid is established and deployed at the server level. Some of these layers include network traffic, file traffic, Internet use, Intranet use, and email. “My Company” will benefit from this much security as it approaches the phase of operations aimed at the Public Sector in business. Through the server side monitoring software logs will display all activities in each layer as indicators detect illicit activity. In addition to monitoring logs, client update rollout and software assurance is conducted on the server machine.
When “My Company” is virus free and hacker proof for the duration of SIX months, the project will be complete. A good indication of this will be when the activity logs reflect a deficit in attempted attacks or if the attacks cease all together.

It is wisdom that is learned when the wise observe the wise. When the owl sees that the fox chases a rat into a field, it then realizes that the cunningness of the fox might be able to feed him. The owl sits in observance and waits for the fox to lure prey from above. The fox in return also uses the owl to its own advantage. The Rat, although weakened by two predators, has no equal underground.

Is this a business philosophy? While you are the predator you are also the pray? No, it teaches you to be wise and observe your fellow predators. With business philosophy, you can take a power hold on a team because you realize the weaknesses and strengths of each member. Better than using philosophy, use respect as authority. If you continually look at an individual as someone you admire and like, they will in return admire and like you.

There are however, rules to abide to in any institution or community. Rules of society and mutual respect govern the bylaws of a business and its predecessors. When you speak as you are a leader, and you are a proven financial win, than people automatically look up to you. It’s not simple to succeed and always win. This is why you must first instill in your employees trust.

It is an infrequent occurrence that two people completely trust one another. Without trust you have no basic relationship. You must equalize trust between yourself and multiple individuals around you. If the trust is broken for even a minute, everyone in the equilibrium knows and feels this. Trust is only once gained and it takes a lifetime to re-establish.

Second, equal working time is divided between the shifts of Customer Service Representatives and the Data Center Engineers. Two teams of Customer Services Representatives work either one of six hours, a day or a night. Two teams of Data Center Engineers work the alternate six hour shifts, a day or a night. A total of four shifts of six hours per team work around the clock a total of 42 hours per seven days. Once a team reaches seven days, it takes a two day break in the routine of the shifts. Starting with the team that goes first and continuing every two days until every team has two days off.

For the team that generates three times more income than it consumes, a bonus of the missed two shifts is paid back in cash. Income earnings may come from helping sales teams or generating ad revenues’ to help spread the word about the security of MY COMPANY.
To prevent the run over of time allotment in this project, the following suggestions are introduced to the project. These suggestions are meant to streamline the project by grouping similar tasks with multiple individuals and assigning new frequency of occurrences to the assigned groups. The first diagram represents the initial proposal. The second diagram represents the adjusted proposal with corrections for time and process compression.

The processes involved with the first diagram show that the Server preparation is managed by a single administrative group and the client machines are maintained by the individual user.

The effectiveness of the Admin Secure installation automation requires that a script run at startup for each client machine. The script tells the client computers to open a port in the firewall of each client and prepare a directory for installation of the new antivirus software. The script is automatically generated by the Admin Secure server software and can be distributed to the client computers over the network share.

Each client computer must be prepared by removing the original antivirus software. The user can do this task because it is not an administrative task. The uninstall process will require the user to restart the computer at the end of the sequence. After the computer restarts, the script that is setup to run after reboot is enacted. The automated installation process will commence without the need of user interaction and the time saved from going to each computer individually will cover the compression requirements set forth in the project scope.

There are some instances that this project could not be compressed further. These include the complications related to the removal of older antivirus software and users that do not know how to do the task assigned. These problems cannot be avoided and could potentially delay the project further.

Was business value realized? Business value remains to be proven in the production of security layering over a computer network. The reason for this is that no one can determine an actual figure to place on the value of information within a business network. Most of the information within the network is invaluable and if lost, could never be recovered (either financially or physically). The value of a layered security platform is more a question of practicality than object-ability.

Was the client satisfied with the project results? This is the most important question being asked during the audit process. The reason that it is the most important question is because the client is the most important being in a business process. Without the client, there would be no business to conduct in the first place. The client satisfaction factorization remains a lifelong pursuit. As long as the business operates at full capacity, there will always be clients that raise questions of concern for their implemented security methods.
Questions like; Can Panda Admin Secure prevent internal theft of information? Can MY COMPANY provide 24/7 support to our company? Will there be any compensation for loss due to neglect on MY COMPANY’s employees? These questions are thoughtful but only give a glimpse at some of the true life scenarios in the business world today. If there were ways to prevent computerized theft of information before it happened, than MY COMPANY aspires to learn more about these methods and prepare to deter these predators.

Planning is never enough when dealing with computers and network environments. There are thousands of variables to consider that at first glance seem insignificant. Most computer users know how to operate the computer. Most computer users know how to avoid mistakes that can lead to viral infections that could compromise sensitive data. There are few individuals in the workplace today that actually abide by the ethics practiced by the guidelines set forth in the company bylaws. The truth to these findings is that people will practice socialization over job performance nine out of ten times.

There is a great need for socialization in the work place but, only at the right time. Unfortunately, social networking websites count for a majority of the viral infections found on computers today. To completely prohibit participation in social networking is almost like prohibiting employees to use the bathroom during the day. The reason for this is because social networking leads to better business, higher sales capacity, and strengthened long term relationships. Social networking is often harmful to computer networks in most cases but, it is not prohibited in many companies.

Panda Admin Secure has the ability to detect malware from ads that generate the malicious code. With the practices of routine updates and daily scans on computers in the network, an additional layer of security is achieved. This additional security is unlike any other corporate antivirus software available in the market today. What makes Panda Admin Secure the most economical, most efficient, and best overall antivirus product for corporate environments is the inclusion of the true prevent and network protect features.

At the start of the “MY COMPANY” project, all of the knowledge of Panda Admin Secure software could not predict the factors of human error. Human error remains the one factor that prevents this project from closure on a 100% successful rating. Because of human error, the end users should be protected against ignorance and neglect before the software is included in and on their computers. The way to accomplish this is to set up expectations before hand with the employees that utilize the computers on a daily basis. Interviews should have been made with each employee to determine what their daily routine consists of. After interview inspections of internet trend tracking (cookie reading) will help to verify that the interviewee is stating the truth and not trying to deceive the network engineer.

The project is completed under budget and on time due to the tremendous planning that was involved in the project. Because of the existing server architecture and network design, the deployment process of installing Panda Admin Secure onto the client machines went well. There were no computers that did not accept the software. There were no Windows related errors that prevented the installation of the security platform. The technical support department at Panda headquarters assisted the engineers, knowledge base developers, and mainframe technicians 100%.

The team members continue to produce sales and continue to produce security for all of the parties involved with the “MY COMPANY” company. This project revealed strengths in relationships with vendors, customers, and third party candidates because it was able to identify the predators from the allies. The companies that declined to include secure business practices with MY COMPANY will no longer be a threat to MY COMPANY nor will they continue to conduct business as insecure operators. The opportunities given to those external parties proved that there are companies in business that are not concerned with security of technology as much as they ought to be.

The future of MY COMPANY is more secure with fewer threats from external sources. The fewer threats will prove to be a win fall for MY COMPANY because it will not require as much money outflow in the security sector in the future. Fewer security risks overall means that less predators will be able to steal vital information from the MY COMPANY computer network. Panda Admin Secure will assist MY COMPANY and its external partners for generations or until new threats arise that are unique in nature.

Sunday, January 17, 2010

Project Management Assignment.



This post was republished to Perry's Swim School Quarry at 6:42:43 PM 1/17/2010


The Six Questions +1















The Six Questions (+1)


Robert Perry


Rasmussen College









B220/GEB1014 Section 01 Project Planning and Documentation - Winter 2010


Nichole Anderson Harris


Sunday, January 10, 2010






The Six Questions (+1)


Answering the six fundamental questions that each project manager should address is not an easy process. With assistance from many different resources, support staff, and mentors any business professional can answer the following questions (six questions);


· What Business Situation is Being Addressed?


· What do you need to do?


· What will you do?


· How will you do it?


· How will you know you did it?


· How well did you do?


Every time a business professional approaches these six questions, a magnitude of variable answers is presented. Often times the answers can lead to more questions that can lead the executive professional on a path further towards confusion. On the other hand, this could become a successful project management approach if the organization has in place the right set of Process Groups.


It becomes relevant in a corporate environment to maintain a level of communications that embodies the entire organization. A structure of governing individuals forms the joints at which each branch of the organization can build. Designating structure to each branch gives objectives to the Process Group so they can complete tasks assigned. Typically there are five different process group branches available to the organization. They are;


· Scoping Process Group


· Planning Process Group


· Launching Process Group


· Monitoring and Controlling Process Group


· Closing Process Group


To recap on what the entire process consists of look at the following illustration.

















If the company represented here is able to answer the six questions related to the methodology, they would represent each question with a symbol. The easiest symbol to use is a circle and each one can be a different color. To earn a seal of approval, each process group must complete the six questions plus, add one additional question that would benefit the project. This is also known as earning the five stars because a project is classified as five star if it is a complete win.


An example for the +1 question would be: Does X-project contain profitability factors? +1 could also be a series of arguments relating to another Processing Group’s final outcome. Say if the Launching Process Group completed the six questions and the Monitoring/Controlling Process Group wanted to know answers relating to their answers, then the +1 question would apply at that time.


Whatever the project final outcome may be, the best results are proven results. The chances of success are higher when you take a team oriented approach than if the organization were to have chaos. Following a guideline approach to Project Management establishes the foundations for success of any project. When the end result is a win, the organization will remain profitable because of this strategy.

Friday, October 23, 2009

Week 2 Assignment NM113/DIG1002C Section 01 Introduction to Multimedia And Computer Graphic Arts

Hardware Trends for Personal Computers

Robert Perry

Rasmussen College

NM113/DIG1002C Section 01 Introduction to Multimedia and Computer Graphic Arts - Fall 2009

Brian Maricle

Friday, October 16, 2009

Hardware Trends for Personal Computers

When engineering a custom built computer setup for individuals there are several things to keep in mind. First and foremost is the cost of the total construction based on the thirteen components required to complete a personal computer. Each part in a custom built computer can be obtained by means of e-commerce websites on the World Wide Web. The most active website for computer parts and accessories is newegg.com. Newegg.com retails computer hardware, software, and electronics at both the Original Equipment Manufacturer (OEM) level and the consumer products division level.

Buying computer components at retail to construct a custom built configuration often increases the price tremendously. While you can buy OEM equipment and software, you should be aware that most of these parts come with a shorter return period and also the warranty is not as long as if you were to buy the product at retail. This is due to the individual vendor's decision to obtain customers that will not depend on full tech support after the product is in their hands. Creating an intelligent customer base is something that all business owners would ideally like to accomplish but few seldom do.

Of the thirteen components required to complete a custom build, 8 are truly parts that a computer cannot survive without. These parts are: (They do not include the input devices such as keyboard, mouse, or monitor.)

  • CPU/Processor
  • Motherboard (Main component board)
  • Power Supply
  • Memory (Random Access Memory)
  • Hard Drive Storage
  • Multimedia / Optical drive
  • Chassis
  • Video Display Adaptor

In the following summary, you will see each component at its current best value followed by the least expensive alternative to each product. All of the information relating to the system specifications of the parts that are displayed here is directly reflected by the item number associated at newegg.com. This list of parts by image and name does not give specific statistics or system specifications due to the length of the figures involved. Instead, a link is provided to the product on the page at newegg.com so you can read more about each part if you wish.

High End Build

Intel i7-975 Extreme 3.33GHz CPU
Item#:N82E16819115212 $999.99
ASUS P6T Deluxe V2
Item#:N82E16813131365 $289.99
CORSAIR DOMINATOR-GT 6GB X2 Packs
Item#:N82E16820145255 $ 679.98
Western Digital 2TB SATA 3.0Gb/s
Item#:N82E16822136365 $299.99
EVGA GeForce GTX 295
Item#:N82E16814130510 $559.99
LG Blu-ray Burner
Item#:N82E16827136176 $199.99
Thermaltake Toughpower 1000W
Item#:N82E16817153053 $304.99

Low End Build

Intel Celeron 1.8GHz CPU
Item #: N82E16819116039 $39.99
Foxconn LGA 775 Motherboard
Item#:N82E16813186167 $46.99
Crucial DDR2 800 2GB
Item#:N82E16820148163 $39.99
Thermaltake Tsunami Case
Item#:N82E16811133132 $94.99
Seagate Barracuda 160GB SATA 3.0Gb/s
Item#:N82E16822148397 $39.99
CORSAIR 400W ATX12V
Item#:N82E16817139008 $49.99
LIAN LI ATX Case
Item#:N82E16811112218 $84.99

The two computer builds shown here represent two completely different types of builds. Each type of build shown, High End and Low End contain interchangeable parts. Each system can upgrade fully to the next generation or can have a single part replaced to complete an upgrade. The High End system has a final price of $3429.91 before Operating System, Software, and Shipping. The Low End system has a final price of $301.94 before Operating System, Software, and Shipping. The Low End computer system also has a built in Video Display Adaptor that is integrated into the Motherboard.

Analyzing the two builds for performance results in the following information:

High End / Low End

i7-Core = 8CPU's 3.333Ghz x 8 = 26.664Ghz / Celeron Single Core CPU 1.8Ghz

DDR3 2000Mhz Triple Channel RAM 12GB / DDR2 800Mhz Dual Channel RAM 2GB

2TB Hard Drive 64MB Cache / 160Gb Hard Drive 8MB Cache

1000Watt Power Supply / 400Watt Power Supply

Blue Ray Burner / None

EVGA Geforce 295 Video / Built In Graphics Display

Mid Tower ATX Case w/window / Micro ATX Case without window

The trends of low performance computing versus high performance computing shows that the extreme high end computers are roughly 10x greater in performance and features than the extreme bottom end custom build. Of course there are many pros and cons to each system as viewed by the user rating system at newegg.com. The most experienced technician will tell you that each system has its strengths and its weaknesses but in the end, both systems are used for two completely different environments. This is equivalent to the high end system for extreme gaming and the low end computer for workstation environment.

Robert Perry

Singleton Honeymoon

SCRIPT

 

[Sunday, October 18, 2009]


 

NM141/DIG1520C Section 02 Digital Media Production - Fall 2009

[This presentation is the vacation of a lifetime, spent sparing no expense. Two young adults Tasha and Kyle Singleton are shown by pictures and short video clips enjoying their time spent. See the same sights and feel the inspirational island paradise as they experienced it. Enjoy watching this short film and remember that as breathtaking as these images are, you still need to breath.]

Mark Tymensky


 

[SCENE 1] [Act 1]

START

Audio IN: Track 02 Island Music – Ed Bailey – Caribbean Sunset Serenade

Fade in: Begin photo 1 00:00:00 – 00:00:07

[First is a closup Picture of some canoes at the beach infront of the crystal blue water. Slow zoom out during time 00:00 and 00:07, reveals more detail about the environment and conditions of the weather. Text enters at 00:01 to establish the first set of dialgue text overlay with animation. Fade out text graphic at 00:06 then transition to photo series 2.]

[Text Graphic Animation]: [from the moment you arrive, Wyndham Sugar Bay Resort & Spa will charm and dazzle you.]

[Image Graphic]: [IMG_0322.JPG]

CUT: End Location Intro, Begin Island Scenery stills.

[SCENE 1] [Act 2]

Fade in: Begin photo SEQUENCE 2 - 20 00:00:07 – 00:00:30

[NExt is a series of still photos of island scenery, beaches, underwater stills, and hotel cameos. These nine photos have a slightly faster zoom in and out rotation. These images maintain a theme of the island vacation by setting a visual location. At 00:08 cut in the next set of text graphic content and animation sequences. Fade text graphic out at 00:12]

[Text Graphic Animation]: [Prepare to lay claim to your own island paradise.]

[Image Graphic Sequence]: [IMG_0320.JPG, IMG_0252.JPG, IMG_0118.JPG, IMG_0173.JPG, IMG_0157.JPG, IMG_0165.JPG, IMG_0171.JPG, IMG_0275.JPG, IMG_0187.JPG, IMG_0213.JPG, IMG_0205.JPG, IMG_0263.JPG, IMG_0273.JPG, IMG_0332.JPG, IMG_0336.JPG, IMG_0350.JPG, IMG_0419.JPG, IMG_0421.JPG, IMG_0387.JPG, IMG_0416.JPG]

CUT: End Island Scenery Stills, Begin pictures of Tasha and Kyle.

END [Scene 1]

[SCENE 2] [Act 1]

Audio continues: Entire Duration

[Intro TASHA and Kyle]

Fade IN: Mixed Photo and Video Clips 00:00:30 – 00:00:38

[Starting with an image of the hotel, foyer, balcony, and leading into photos with both Tasha and Kyle. This mini sequence will use the established location and setting to gain familiarity with Kyle and Tasha.]

[Image Graphic Sequence]: [IMG_0121.JPG, IMG_0418.JPG, IMG_0365.JPG, IMG_0143.JPG]

CUT: End Act 1 begin Act 2

[SCENE 2] [Act 2]

Fade in: Video clips 00:00:38 – 00:02:30

[Begin underwater video sequence with Kyle and Tasha Underwater. Next, transition to island driving edit with stills slowly passing by like post cards. Finally, begin to draw near the parasail sequence at the end of the road trip journey. Part of the road trip increases speed to bypass some of the dull parts and shaking.]

[IMAGE Graphic Sequence]: [IMG_0362.JPG, IMG_0348.JPG, IMG_0291.JPG, IMG_0234.JPG, IMG_0166.JPG, IMG_0317.JPG, IMG_0411.JPG, IMG_0333.JPG ]

[Video Graphic Sequence]: [MVI_0303.AVI, MVI_0305.AVI, MVI_0311.AVI, MVI_0312.AVI, MVI_0316.AVI, MVI_0319.AVI ]

CUT: End Video Sequence fade to Scene 3

CUT: End Act 1 begin Act 2

[SCENE 3] [Act 1]

Fade in: Still Photos with minimal video capture mix. 00:02:30 – 00:03:00

[Begin parasailing sequence for climax of feature. Show the photos of the boat with Kyle and Tasha in tow transitioning to higher elevations with a few mixed in video captures. The tempo of this final segment is much quicker than the previous series.]

[IMAGE Graphic Sequence]: [IMG_0372.JPG, IMG_0374.JPG, IMG_0375.JPG, IMG_0376.JPG, IMG_0378.JPG, IMG_0380.JPG, IMG_0382.JPG, IMG_0383.JPG, IMG_0390.JPG, IMG_0391.JPG, IMG_0394.JPG, IMG_0395.JPG, IMG_0397.JPG, IMG_0398.JPG, IMG_0406.JPG, ]

[Video Graphic Sequence]: [MVI_0399.AVI, MVI_0402.AVI, MVI_0403.AVI, MVI_0404.AVI, ]

CUT: End Still Photos with minimal video capture mix. Fade to Scene 4.

[SCENE 4] [Act 1]

Fade in: Still Photos with final video capture. 00:03:00 – 00:03:30

[Begin the final departure sequence. In this 30 second segment, the photos of the island airport turn into a final takeoff of the last flight going home. The audience will end this short film with a feeling they just went to the island personally. Leaving on the airplane takeoff draws end to this short film.]

[Text Graphic Animation]: [Wyndham Sugar Bay is the ultimate island retreat.]

[Text Graphic Animation]: [Prepare to discover your own island paradise.]

[IMAGE Graphic Sequence]: [IMG_0438.JPG, IMG_0439.JPG, IMG_0440.JPG, IMG_0441.JPG, IMG_0442.JPG ]

[Video Graphic Sequence]: [MVI_0447.AVI]

CUT: End Still Photos with final video capture. 00:03:30

NM141/DIG1520C Section 02 Digital Media Production - Fall 2009

Classwork for Digital Media Productions